Claim Missing Document
Check
Articles

Mixed integer linear programming for cadet dormitory placement at Indonesia Defense University Pradhana Putra, I Made Aditya; Manurung, Jonson; Saragih, Hondor
Jurnal Mandiri IT Vol. 14 No. 3 (2026): Jan: Computer Science and Field
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v14i3.487

Abstract

Cadet dormitory placement at Indonesian Defense University was currently performed manually by administrative staff, resulting in potential inefficiencies in room assignments regarding walking distance, study program cohesion, and cadet preferences. This research developed a Mixed Integer Linear Programming (MILP) optimization model to automate and improve the dormitory assignment process for military education institutions. The general framework addresses 1,550 cadets distributed across four cohorts and 13 study programs in   dormitory buildings with standardized configurations (3 floors, 25 rooms per floor, 2 cadets per room). The MILP model incorporated three objectives: minimizing total walking distance to academic facilities, maximizing study program cohesion by concentrating programs within specific floors, and maximizing cadet floor preference satisfaction. The model was formulated with configurable weight parameters (w₁, w₂, w₃) enabling administrators to balance competing objectives according to institutional priorities. A validation case study with 38 male cadets from two study programs demonstrated computational feasibility, with the CBC solver achieving optimal solutions in 0.34 seconds (strict constraint approach) and 0.11 seconds (maximum occupancy approach) on standard desktop hardware, both with 0.00% MIP gap confirming proven optimality. The validation study compared two policy approaches: strict constraint enforcement achieving 95% room occupancy with 20 rooms, and maximum space utilization achieving 100% occupancy with 19 rooms. This research contributed the first application of MILP optimization to military education dormitory management in Indonesia, providing a scalable framework with empirical validation for computational tractability and a replicable methodology for resource allocation optimization in defense institutions.
Mapping monthly consumer purchasing patterns at the UNHAN RI Cooperative using time series analysis and LSTM Sigalingging, Miranda Bintang Maharani; Prabukusumo, M. Azhar Prabukusumo; Manurung, Jonson
Jurnal Mandiri IT Vol. 14 No. 3 (2026): Jan: Computer Science and Field
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v14i3.488

Abstract

This study investigated the monthly purchasing patterns of consumers at Koperasi Unhan RI and developed forecasting models to support data-driven inventory and procurement planning. Historical cooperative sales data from 2020–2024 were analyzed using time series decomposition, autocorrelation analysis, ARIMA modeling, and a Long Short-Term Memory (LSTM) neural network. The analysis revealed a clear upward trend and strong annual seasonality, with consistent demand peaks occurring in December. The ARIMA model achieved significantly lower prediction errors than the LSTM model and successfully captured both trend and seasonal components. A 12-month forecast for 2025 was then generated to support operational decision-making. The forecasting results provide practical managerial insights for cooperative management, particularly in optimizing inventory levels, scheduling procurement, and anticipating seasonal demand fluctuations. The novelty of this study lies in the comparative application of classical time-series and deep learning approaches within a cooperative context using limited historical data, demonstrating that ARIMA remains a robust and interpretable solution for small to medium-sized cooperative environments. This research concludes that time series analysis combined with ARIMA forecasting effectively mapped consumer purchasing patterns and produced actionable demand predictions for the subsequent year.
Cryptographic algorithm optimization for defense data security using quantum inspired algorithms Bagus Hendra Saputra; Jonson Manurung; Jeremia Paskah Sinaga
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid advancement of quantum computing poses a critical threat to classical public-key cryptographic systems widely used in defense communication infrastructures, while the practical deployment of post-quantum cryptography (PQC) remains constrained by excessive key sizes, computational overhead, and energy consumption in bandwidth- and latency-sensitive military environments. This study aims to develop and evaluate a quantum-inspired multi-objective optimization framework to enhance the operational feasibility of standardized PQC schemes without compromising cryptographic security. The proposed method applies a Quantum Genetic Algorithm (QGA) to optimize configuration parameters of CRYSTALS-Kyber and CRYSTALS-Dilithium by simultaneously balancing security strength, computational performance, resource efficiency, and deployability. Experiments were conducted using official NIST test vectors and defense-oriented communication scenarios, with performance evaluated across encryption and signature latency, throughput, key and signature sizes, memory footprint, and energy consumption, while security was validated against classical and quantum attack models. The results demonstrate that the optimized configurations achieve key and signature size reductions of up to 10.3%, throughput improvements of up to 15.5%, and energy consumption reductions of up to 12.5% compared to baseline NIST implementations, while fully maintaining NIST security levels and robust resistance to quantum adversaries. These improvements significantly enhance the suitability of PQC for tactical radios, satellite communications, and resource-constrained defense platforms. The findings indicate that quantum-inspired multi-objective optimization is a critical enabler for transitioning post-quantum cryptography from theoretical security constructs to deployable, mission-ready solutions in real-world defense systems.
Multimodal deep learning framework for detection and attribution of adversarial information operations on social media platforms Nick Holson M. Silalahi; Jonson Manurung; Bagus Hendra Saputra
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Adversarial information operations on social media platforms pose critical threats to national security, with state-sponsored actors exploiting multimodal content manipulation to conduct sophisticated disinformation campaigns. Existing detection approaches focus on single-modality analysis, lacking comprehensive frameworks for simultaneous detection, attribution, and coordination identification. This research develops an integrated multimodal deep learning framework combining RoBERTa-large transformer, Vision Transformer, Graph Convolutional Networks, and bidirectional LSTM, unified through cross-modal attention fusion with multi-task learning optimization. Experimental validation utilizes eight datasets including Russian IRA tweets (3.8M posts), Fakeddit (1M submissions), TweepFake (25K accounts), FakeNewsNet (23K articles), MM-COVID (6.7K posts), CREDBANK (60M tweets), and MEMES (12K items). Results demonstrate 93.24% detection accuracy, 79.34% attribution accuracy across 15 threat actor groups, 91.67% coordination F1-score, 88.62% narrative classification accuracy, and 448ms inference latency suitable for real-time deployment. Ablation studies reveal graph neural networks provide largest performance contribution (5.82% improvement), highlighting social network analysis importance for detecting coordinated behavior. Future directions include large-scale pre-training, adversarial training, continual learning, human-AI collaboration, multilingual expansion, federated learning, and causal inference methods.
Blockchain-enhanced security framework for defense supply chain management: an AI-driven smart contract approach with distributed ledger technology Hondor Saragih; Jonson Manurung; Hengki Tamando Sihotang; I Made Aditya Pradhana Putra
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Defense supply chains face critical security challenges including counterfeit components, unauthorized access, data tampering, and supply chain attacks that compromise operational integrity and national security. Existing blockchain implementations suffer from limited scalability, inadequate threat detection mechanisms, and insufficient integration with modern AI technologies for real-time security monitoring. This research develops an AI-Enhanced Blockchain Security Framework combining smart contracts with distributed ledger technology specifically designed for defense supply chain management. The framework employs multi-signature authentication, cryptographic verification, and machine learning-based anomaly detection across a three-layer architecture (blockchain layer, security layer, analytics layer). Validation using the DataCo supply chain dataset (180K operations) and Backstabber's knife collection attack patterns (174 documented attacks) demonstrates 94.7% attack detection accuracy, 87.3% reduction in unauthorized access attempts, and 99.2% data integrity verification rate. The system achieved 850 transactions per second (TPS) throughput with 1.8-second average latency and 40% cost reduction compared to traditional centralized systems. Smart contract execution showed 99.96% reliability across 10,000 test scenarios with automated enforcement of security policies. Statistical validation confirmed significant superiority over conventional approaches (p<0.001). Future work includes quantum-resistant cryptography, federated learning for privacy-preserving analytics, cross-chain interoperability, and integration with IoT sensors for real-time supply chain monitoring.
A multi-objective Particle Swarm Optimization framework for defense logistics decision-making under dynamic and crisis conditions anindito anindito; Adam Mardamsyah; Jonson Manurung
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The complexity of decision-making in defense logistics systems has increased significantly due to demands for cost efficiency, distribution speed, and operational resilience in dynamic and crisis conditions. Conventional optimization approaches generally fail to capture these conflicting objectives simultaneously. This study aims to develop and evaluate a multi-objective optimization framework based on Multi-Objective Particle Swarm Optimization (MO-PSO) to support adaptive and performance-based defense logistics decision-making. The proposed method optimizes three main objective functions, namely minimizing operational costs, minimizing distribution time, and maximizing logistics readiness levels, with numerical parameter adjustments designed for the defense environment. Simulation results show that MO-PSO is capable of producing a more convergent and evenly distributed Pareto Front compared to comparison methods such as NSGA-II and standard MOPSO, with a 12.4–18.7% increase in hypervolume and a 21.3% decrease in solution dominance error. These findings indicate that the proposed approach is more effective in simultaneously balancing multi-objective trade-offs. Practically, the research results provide policy implications for defense planners in designing logistics strategies that are more efficient, responsive, and resilient to operational uncertainty.
Disinformation propagation modeling in digital information warfare using hybrid GNN and LSTM Manurung, Jonson; Saragih, Hondor; Mardamsyah, Adam; Sinaga, Jeremia Paska
Journal of Intelligent Decision Support System (IDSS) Vol 9 No 1 (2026): March: Intelligent Decision Support System (IDSS)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/idss.v9i1.345

Abstract

The rapid growth of digital information warfare has enabled the widespread dissemination of disinformation, posing serious challenges for detection systems. However, most existing approaches treat disinformation detection as a static classification problem and fail to consider the network structure and temporal dynamics of information spread. This study proposes a hybrid deep learning model that combines Graph Attention Networks (GAT) and Bidirectional Long Short-Term Memory (BiLSTM) with a cross-attention mechanism to capture both structural and temporal patterns of disinformation propagation.  The proposed model was evaluated using three datasets: the PHEME rumor dataset, a large-scale Twitter and X crisis dataset, and a synthetically generated defense simulation dataset. Experimental results show that the model achieves strong performance, with 92.47% accuracy in classification, 89.63% precision in cascade prediction, 87.91% F1-score in source identification, and a mean absolute error of 0.183 in predicting spread dynamics, outperforming several baseline methods. These findings demonstrate that integrating network-based and temporal modeling can significantly improve disinformation detection performance. Future research will focus on incorporating multimodal data, real-time processing, and cross-platform learning to enhance the robustness of the proposed approach.
Distributed cyber defense framework based on federated learning for attack detection in defense infrastructure Saragih, Hondor; Saragih, Hoga; Manurung, Jonson; Adha, Rochedi Idul; Naibaho, Frainskoy Rio
Journal of Intelligent Decision Support System (IDSS) Vol 9 No 1 (2026): March: Intelligent Decision Support System (IDSS)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/idss.v9i1.346

Abstract

Cyber threats targeting defense infrastructure have escalated in complexity, rendering centralized intrusion detection systems insufficient due to their inability to guarantee data privacy across distributed military nodes. This study proposes a distributed cyber defense framework that employs federated learning to enable collaborative model training without transmitting raw network traffic beyond individual nodes. The framework integrates an adaptive aggregation strategy combining FedAvg and FedProx, a hybrid deep learning architecture consisting of convolutional neural networks and long short term memory networks, an autoencoder module for unsupervised anomaly detection, a Byzantine robust aggregation mechanism, and post hoc explainability through SHAP and LIME. Experiments were conducted on CIC IDS 2017, CIC IDS 2018, UNSW NB15, and a synthetically generated military network traffic dataset. The proposed framework attained a peak accuracy of 98.74% and an F1 score of 98.12% on CIC IDS 2017, consistently outperforming five baseline methods by up to 5.29 percentage points in F1 score. Future work will investigate differential privacy integration and model compression for deployment on resource constrained tactical edge devices.
Enhancing XGBoost performance for classification tasks using particle swarm optimization and SHAP-based model interpretability Budiman, Mohammad Andri; Manurung, Jonson
International Journal of Basic and Applied Science Vol. 14 No. 4 (2026): March: Computer Science
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/ijobas.v14i4.771

Abstract

Phishing remains one of the most critical and rapidly evolving cyber threats, with increasing incidents that challenge conventional detection mechanisms such as blacklist-based approaches. Although machine learning models have improved phishing detection accuracy, many studies emphasize performance optimization without adequately addressing model interpretability and transparent decision-making. This study aims to develop an optimized and explainable phishing detection framework by integrating XGBoost with Particle Swarm Optimization (PSO) for hyperparameter tuning and SHAP for interpretability analysis. The proposed approach was evaluated on the UCI Phishing Websites dataset consisting of 11,055 samples and 30 features, using accuracy, precision, recall, F1-score, and ROC-AUC as performance metrics. Experimental results show that XGBoost optimized using PSO achieved the best performance with an accuracy of 0.911, precision of 0.906, recall of 0.902, F1-score of 0.904, and ROC-AUC of 0.935, outperforming Random Forest (accuracy 0.896; ROC-AUC 0.921), SVM (accuracy 0.872; ROC-AUC 0.903), and XGBoost with default hyperparameters (accuracy 0.842; ROC-AUC 0.875). Furthermore, SHAP analysis identified key influential features such as Have_IP and URL_Length, providing transparent insights into model decisions. These findings demonstrate that combining metaheuristic optimization with explainable AI significantly enhances both predictive performance and interpretability, contributing to the development of reliable and trustworthy phishing detection systems in dynamic cybersecurity environments.
Co-Authors Adam Mardamsyah Adha, Rochedi Idul Agus Firmansyah Agustina Simangunsong Al Hashim, Safa Ayoub Amran Sitohang Andri Budiman, Mohammad anindito anindito Bagus Hendra Saputra Bagus Hendra Saputra Barus, Nadela Bosker Sinaga Bosker Sinaga Bosker Sinaga, Bosker Sinaga Br Sitepu, Siska Feronika Br Tarigan, Nera Mayana Dhaifullah, Rendi Hanif Erika Novianti Eryan Ahmad Firdaus Febrian Wahyu Christanto Ferdinand Tharorogo Wau Firdaus Laia Firdaus Situmorang Frainskoy Rio Naibaho Hanan, Rohman Ali Hardy Priyatno Ambarita Harpingka Sibarani Hasugian , Paska Marto Hengki Tamando Sihotang Hidayati, Ajeng Hoga Saragih Hondor Saragih I Made Aditya Pradhana Putra Jeremia Paskah Sinaga Johanes Perdamenta Sembiring Kadin Darlianto Tinambunan Kanur L. P. Situmorang Logaraj Logaraj Logaraj, Logaraj M Azhar Prabukusumo Mardamsyah, Adam Maria Siahaan Maya Theresia Br. Barus Maya Theresia Br. Barus Merlin Helentina Napitupulu Mina Kumari Mohammad Andri Budiman Muhammad Azhar Prabukusumo Muthmainnah, Ihmatull Nasyira, Muhammad Sulthan Nick Holson M. Silalahi Nuriansyah, Agam Pandiangan, Boyner Phatoni, Khaerul Imam Piliang, Rizqullah Aryaputra Poltak Sihombing Prabukusumo, M Azhar Prabukusumo, M. Azhar Prabukusumo Prabukusumo, Muhammad Azhar Pradhana Putra, I Made Aditya Putra, Muhammad Ridho Alghifari Ramen, Sethu Rinaldy Chaniago Sawaluddin Sawaluddin, Sawaluddin Sethu Ramen Sethu Ramen, Sethu Ramen Sidiq, Maulana Sigalingging, Miranda Bintang Maharani Sihombing, Agus Putra Emas Sihotang, Amran Silalahi, Monalisa Hotmauli Simangunsong, Humala Sinaga, Jeremia Sinaga, Jeremia Paska Sinaga, Ryan Fahlepy Sri Kumala Sari Tsany, Tazky Uzitha Ram Vernando, Deden